Objective of this assignment is to assess the understanding of students about basics of Information Security, Security services, OSI Security Architecture, Legal, ethical and Professional Issues in Information Security.

Instructions

Please read the following instructions carefully before submitting assignment:

You should consult the recommended books, PowerPoint slides and audio lectures to clarify your concepts.

You are supposed to submit your assignment in .doc or .docx format. Any other formats like SCAN IMAGES, PDF, ZIP, RAR and BMP will not be accepted.

It should be clear that your assignment will not get any credit if:

The assignment is submitted after due date.

The assignment is copied from Internet or from any other student.

The submitted assignment does not open or file is corrupt.

Note: No assignment will be accepted after the due date through email in any case (load shedding, server down, internet malfunctioning etc.).

It is recommended to upload solution file at least two days before its closing date.

Samsung Group is a well-known South Korean multinational company. It comprises numerous affiliated businesses, most of them united under the Samsung brand. Under the Samsung brand, they widely produce electronic devices such as mobile phones.

Samsung is planning to launch a wearable mobile design, which has an advance charging mechanism dependent on human pulse. This idea is considering as the breakthrough in wearable mobile devices and other business opponents wants to get into this idea.

Suppose you are hired as an Information security analyst. Your job is to check the current security system and you must enhance the system to deal any type of threats.

So, considering your job responsibilities, you should answer the following questions.

Question No 1: Marks:5

Samsung research department was working on pulse detection system and they have made a complete proposed circuit diagram that will help to detect the human pulse and its rate. As per the research team, it will be the final proposed design.

This circuit diagram was later sent to testing department for testing purposes, where they have found a minor mistake in proposed design.

When communicated among the research and testing departments, the research department scientists were insisting that, they have sent the working circuit diagram and it seems that the data was altered during the transmission.

So, you must ensure the data originality, which service you suggests to be implemented and why? Justify you answer.

Question No 2: Marks:5

After the approval of the proposed design, a complete circuit was compacted to an Integrated Circuit Chip (IC). This IC design was shared with a third-party hardware manufacturer XYZ for bulk production of that IC. The Samsung Research department and XYZ manufacturers shared a business account. Either the departmental head from Samsung or the CEO of XYZ firm can only withdraw the money from that account.

At the end of a month, a discrepancy of money was a found. After analysis, it was found that someone’s from XYZ firm had made that transaction but nobody was taking the responsibility.

To ensure, this should never happen again, as an information security analyst, which service would you suggest to be implemented and why? Justify your answer.

Question No 3: Marks:5

As stated, the final design was altered during transmission. Now the Research department head is insisting you to enhance or redefine the security levels so that they only specified heads or executives can access the research and design lab and all other staff should have some restrictions in this case.

Question No 4: Marks:5

During the chip (IC) manufacturing, the CEO of XYZ firm request Samsung research department to view the initial Pulse detection circuit diagram. Permission was granted by Samsung research department. Later when the CEO of XYZ firm was questioned about the need to view the initial circuit diagram, both parties were surprised that the CEO of XYZ firm never made such request. Someone outside the premises has pretended to be the CEO of XYZ firm to get the access to the initial circuit diagram.

As an information system analyst, to avoid such scenario which service you would suggest to be implemented and why? Justify your answer.

We are here with you hands in hands to facilitate your learning and do not appreciate the idea of copying or replicating solutions. Read More>>

Note:-

For Important Helping Material related to this subject(Solved MCQs, Short Notes, Solved past Papers, E-Books, FAQ,Short Questions Answers & more). You must view all the featured Discussion in this subject group.

For how you can view all the Featured discussions click on the Back to Subject Name Discussions link below the title of this Discussion & then under featured Discussion corner click on the view all link.

Today Top Members

We are user-generated contents site. All product, videos, pictures & others contents on vustudents.ning.com don't seem to be beneath our Copyrights & belong to their respected owners & freely available on public domains. We believe in Our Policy & do according to them. If Any content is offensive in your Copyrights then please email at m.tariqmalik@gmail.com or Contact us at contact Page with copyright detail & We will happy to remove it immediately.